edix / HiddenProcessDetectionLinks
Examples for detection of hidden processes on windows
☆35Updated 11 years ago
Alternatives and similar repositories for HiddenProcessDetection
Users that are interested in HiddenProcessDetection are comparing it to the libraries listed below
Sorting:
- A-Protect Anti Rootkit Tool☆54Updated 11 years ago
- Helper utility for debugging windows PE/PE+ loader.☆52Updated 10 years ago
- Protect process fsfilter driver. Windows x64☆36Updated 9 years ago
- Open and generic Anti-Anti Reversing Framework. Works in 32 and 64 bits.☆66Updated 13 years ago
- library, which help to describe or load and execute PE files.☆55Updated 12 years ago
- PoC for detecting and dumping code injection (built and extended on UnRunPE)☆58Updated 7 years ago
- Windows Kernel Driver - Create a driver device in TDI layer of windows kernel to capture network data packets☆37Updated 11 years ago
- A command line tool to load and unload a device driver.☆46Updated 8 years ago
- OpenHIPS prevents exploitation of Windows systems☆35Updated 12 years ago
- just an lite AntiRootkit for interesting☆24Updated 9 years ago
- The dll that can hide itself and then delete itselft.☆31Updated 12 years ago
- The project is a demo solution for one of the anti-rootkit techniques aimed on overcoming splicers☆35Updated 8 years ago
- Class implementation of PowerLoader injection technique☆32Updated 8 years ago
- Maltrace is a simple syscall tracer for Windows implemented through the use of PIN.☆24Updated 12 years ago
- Bypass HackShield several specific SSDT hook in Ring0☆24Updated 10 years ago
- windows create process with a dll load first time via LdrHook☆31Updated 9 years ago
- Simple standalone bundle of NT core APIs☆25Updated 9 years ago
- Windows anti-rootkit library☆36Updated 10 years ago
- Handy WMI query tool.☆12Updated 9 years ago
- UI application that can compare PE images in memory or in raw PE file☆19Updated 11 years ago
- Simple tool for unpacking packed/protected malware executables.☆33Updated 14 years ago
- User-mode process cross-checking utility intended to detect naive malware hiding itself by hooking IAT/EAT.☆19Updated 9 years ago
- ☆34Updated 7 years ago
- A tool to help malware analysts tell that the sample is injecting code into other process.☆79Updated 10 years ago
- ☆24Updated 5 years ago
- MIR-Engine☆25Updated 8 years ago
- Obtain remote process cookies by performing a brute-force attack on ntdll.RtlDecodePointer using known pointer encodings.☆22Updated 8 years ago
- Anti-Anti-VM solution via Windows Driver☆60Updated 7 years ago
- Simple program for static hooking dynamic libraries in executable application☆24Updated 11 years ago
- OpenSrc projects; common multiprojects headers store to ./Common/*category*/☆51Updated 11 years ago